[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Network and System Security

6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings

  • Conference proceedings
  • © 2012

Overview

  • Up-to-date results
  • Fast track conference proceedings
  • State-of-the-art report

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7645)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: NSS 2012.

This is a preview of subscription content, log in via an institution to check access.

Access this book

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.

Similar content being viewed by others

Keywords

Table of contents (39 papers)

  1. Network Security I

  2. Network Security I

  3. Public Key Cryptography I

  4. Privacy I

  5. Authentication I

  6. Network Security II

Other volumes

  1. Network and System Security

Editors and Affiliations

  • School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China

    Li Xu

  • Department of Computer Science, CERIAS and Cyber Center, Purdue University, West Lafayette, USA

    Elisa Bertino

  • School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia

    Yi Mu

Bibliographic Information

Publish with us